Created on 05-21-2020 08:49 AM Edited on 06-01-2023 07:09 AM By Stephen_G
In FortiOS version V6.2 onwards, the external block list (threat feed) can be added into firewall policy.
In addition to using the external block list for web filtering and DNS, it can be used in firewall policies.
This article describes how to use the external block list.
This version includes the following new features:
1) Policy support for external IP list used as source/destination address.
2) Support for IPv4 and IPv6 firewall policy only. ACL, DoS, NAT64, NAT46, shaping, local-in policy are not supported.
3) Support for both CLI and GUI.
From version 7.2.4 and 7.4.0, the External Threat Feed object is now additionally supported in local-in policies. It can be added as a srcaddr or a dstaddr.
Go to Security Fabric -> Fabric Connectors -> Threat Feeds -> IP Address, create or edit an external IP list object.
The content of external feed can be monitored with the following API query:
access_token=Hnb9ccdd17y10xnp7zn1mjtwkQ0nwN where 'USOM' is the name of the external threat feed.
This API query will show both content of the feed and the latest status of feed update.
In case of a communication issue, the API query will report the status as 'error' similar to the
Following example :
The following URL will provide only the status of the External connector without the content of it :
Remark: In case of communication issues, FortiGate does not receive the updates but preserves the original file.
Below are the steps for configuring windows PC as an external server for a threat feed:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.